# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
feae36bb7ace346e3a22fbab9818cea1045c8380be71f3d6c476a414a4a1ee3f
Pseudo Output
b0e8d0c160afe54a8500033eb41966120bb59fca4af711baabea06f1086ee71f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6a3c07f959414cc146d097f59c1d0f0d65e323742e5d7a8862406eddad13b6f
Commitment
e264253e2262c7c97b37fda4c9935525f465960479dd32668e76b7786be1535a
Range Proof
672 bytes (Bulletproof)
Memo
e0acee470548af258a935c72c47729246890eb1057d127df20fb31a07f06033d77defc1cf318b914475a159553c44168f0dedc06be027b586c62250236aca3599412c187230ed83a3fe508d0f81c27c35997d47afbc2e72714a7e1c704e812d9907fb0afbe90f7a5baeab85726558a148c7a58ac5063c7e019162dba9b7fefd2 (encrypted)
Stealth Address
027cd0a099a9fd8e2866f200829e61253838a2be6a195b084f1f2d7533ef8412
Commitment
108c18f5163f5b7e35c6498dc93d6d302e3a715d146e5a6fa8bd8631b105c856
Range Proof
672 bytes (Bulletproof)
Memo
6f87c68b77806013caa65a8b8a27029d02a213f4d98fed084ffa2e5096c5248954778e1fe0a1b2410ffc6729c518047d3d60004eda7c55c4c3df330219a64bd656060165cf7dbed5aa83b5aa388f84aefd54345ce28e9608191e3c3e94295d48a969ab215d7d6bfcbb1f13d585d9fce3aa11756764c9be8f88be38addae7a37e (encrypted)
Stealth Address
06e492280d3187b5c3e209b22befb85f338aa36cb9c815294a2b3a21915d5774
Commitment
905066d067be5ebfc620a078bdc88d258f91255e537e92f70389c627502b795a
Range Proof
672 bytes (Bulletproof)
Memo
1e454c08ade8b4555c0a13dbe4daf7bb49118d2ab300115f65d896d6063dbd6c6a672c304acc50bcbe4dadf112dbd755534ad71a7914d93ee038d6c61048f5202f2aaf40c220040871a180525ea7044db4ea736dc151f8e440ff2aca05d01b725d974c7a98fbf257439482193fd8caae192a717fa58a889c841920d3484db7d7 (encrypted)